banner

Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data

R. Mohan Naik, H. Manoj T. Gadiyar, M. Bharathraj Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. Anil Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad

Abstract


In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.


Keywords


key management; Ciphertext Policy Attribute-based Encryption (CP-ABE); Proxy Re-Encryption (PRE)

Full Text:

PDF

References


1. Premkamal PK, Pasupuleti SK, Alphonse P. Dynamic traceable CP‐ABE with revocation for outsourced big data in cloud storage. International Journal of Communication Systems 2020; 34(2): e4351. doi: 10.1002/dac.4351

2. Xue K, Gai N, Hong J, et al. Efficient and secure attribute-based access control with identical sub-policies frequently used in cloud storage. IEEE Transactions on Dependable and Secure Computing 2020; 19(1): 653–646. doi: 10.1109/TDSC.2020.2987903

3. Zhao Y, Ren M, Jiang S, et al. An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing 2019; 101(8): 1041–1065. doi: 10.1007/s00607-018-0637-2

4. Wang S, Wang X, Zhang Y. A secure cloud storage framework with access control based on blockchain. IEEE Access 2019; 7: 112713–112725. doi: 10.1109/ACCESS.2019.2929205

5. Rath M. Resource provision and QoS support with added security for client side applications in cloud computing. International Journal of Information Technology 2019; 11(2): 357–364. doi: 10.1007/s41870-017-0059-y

6. Singh A. Security concerns and countermeasures in cloud computing: A qualitative analysis. International Journal of Information Technology 2019; 11(4): 683–690. doi: 10.1007/s41870-018-0108-1

7. Lei S, Zishan D, Jindi G. Research on key management infrastructure in cloud computing environment. In: 2010 Ninth International Conference on Grid and Cloud Computing; 1–5 November 2010; Nanjing, China. pp. 404–407.

8. Fathi H, Shin S, Kobara K, et al. LR-AKE-based AAA for network mobility (NEMO) over wireless links. IEEE Journal on Selected Areas in Communications 2006; 24(9): 1725–1737. doi: 10.1109/JSAC.2006.875111

9. Sanka S, Hota C, Rajarajan M. Secure data access in cloud computing. In: 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application; 15–17 December 2010; Bangalore, India. pp. 1–6.

10. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security (CCS ’06); 30 October–3 November 2006; Alexandria Virginia USA. pp. 89–98.

11. Tysowski P, Hasan MA. Hybrid attribute-based encryption and re-encryption for scalable mobile applications in clouds. IEEE Transactions on Cloud Computing 2013; 1(2): 172–186. doi: 10.1109/TCC.2013.11

12. Li J, Yao W, Zhang Y, et al. Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Transactions on Services Computing 2017; 10(5): 785–796. doi: 10.1109/TSC.2016.2520932

13. Ramachandra MN, Gadiyar HMT, Bharathrajkumar M, et al. Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data. International Journal of Pervasive Computing and Communications 2022; doi: 10.1108/IJPCC-06-2022-0223

14. Ge C, Susilo W, Baek J, et al. A verifiable and fair attribute-based Proxy Re-Encryption scheme for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 2021; 19(5): 2907–2919. doi: 10.1109/TDSC.2021.3076580




DOI: https://doi.org/10.32629/jai.v6i3.748

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 R. Mohan Naik, H. Manoj T. Gadiyar, M. Bharathraj Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. Anil Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad

License URL: https://creativecommons.org/licenses/by-nc/4.0